In response to feedback from operational security communities, CAIDA's source address validation measurement project (https://spoofer.caida.org) is automatically generating monthly reports of ASes originating prefixes in BGP for systems from which we received packets with a spoofed source address. We are publishing these reports to network and security operations lists in order to ensure this information reaches operational contacts in these ASes. This report summarises tests conducted within usa, can. Inferred improvements during Jan 2021: ASN Name Fixed-By 54825 PACKET 2021-01-12 7859 PAIR-NETWORKS 2021-01-31 Further information for the inferred remediation is available at: https://spoofer.caida.org/remedy.php Source Address Validation issues inferred during Jan 2021: ASN Name First-Spoofed Last-Spoofed 209 CENTURYLINK-US-LEGACY-QWEST 2016-08-16 2021-01-25 7459 GRANDECOM-AS1 2016-09-26 2021-01-28 20412 CLARITY-TELECOM 2016-09-30 2021-01-31 6181 FUSE-NET 2016-10-10 2021-01-31 14971 PINETEL 2016-10-21 2021-01-30 11427 TWC-11427-TEXAS 2016-10-21 2021-01-27 30036 MEDIACOM-ENTERPRISE-BUSINESS 2016-11-16 2021-01-29 63296 AWBROADBAND 2017-09-01 2021-01-27 12222 AKAMAI 2018-02-14 2021-01-14 393564 SPOKANE 2018-06-05 2021-01-26 33452 RW 2018-09-19 2021-01-30 20448 VPNTRANET-LLC 2018-09-20 2021-01-28 8047 GCI 2019-04-11 2021-01-29 6391 URBAN-15 2020-05-29 2021-01-09 11814 DISTRIBUTEL-AS11814 2020-11-22 2021-01-16 208188 PUGET-SOUND-NETWORKS 2020-12-04 2021-01-30 13886 CLOUD-SOUTH 2021-01-05 2021-01-05 33749 ATMC 2021-01-05 2021-01-05 7885 YUKONCOLLEGE 2021-01-14 2021-01-22 53703 KWIKOM 2021-01-17 2021-01-26 Further information for these tests where we received spoofed packets is available at: https://spoofer.caida.org/recent_tests.php?country_include=usa,can&no_block=1 Please send any feedback or suggestions to spoofer-info@caida.org
participants (1)
-
CAIDA Spoofer Project